Question No: 641 – (Topic 4)

Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?

Check the referrer field in the HTTP header

Disable Flash content

Use only cookies for authentication

Use only HTTPS URLs

Answer: A Explanation:

XSRF or cross-site request forgery applies to web applications and is an attack that exploits the web application’s trust of a user who known or is supposed to have been authenticated. This is accomplished by changing values in the HTTP header and even in the user’s cookie to falsify access. It can be prevented by embedding additional authentication data into requests that allows the web application to detect requests from unauthorized locations. Examples are synchronizer token patterns, cookie-to-header tokens, and checking the HTTP Referrer header and the HTTP Origin header.

Question No: 642 – (Topic 4)

Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?

Folder encryption

File encryption

Whole disk encryption

Steganography

Answer: C

Explanation:

Full-disk encryption encrypts the data on the hard drive of the device or on a removable drive. This feature ensures that the data on the device or removable drive cannot be accessed in a useable form should it be stolen. Furthermore, full-disk encryption is not dependant on knowledge of the file structure.

Question No: 643 – (Topic 4)

After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

`Please only use letters and numbers on these fields’ Which of the following is this an example of?

Proper error handling

Proper input validation

Improper input validation

Improper error handling

Answer: B Explanation:

Input validation is an aspect of secure coding and is intended to mitigate against possible user input attacks, such as buffer overflows and fuzzing. Input validation checks every user input submitted to the application before processing that input. The check could be a length, a character type, a language type, or a domain.

Question No: 644 – (Topic 4)

A security administrator has implemented a policy to prevent data loss. Which of the following is the BEST method of enforcement?

Internet networks can be accessed via personally-owned computers.

Data can only be stored on local workstations.

Wi-Fi networks should use WEP encryption by default.

Only USB devices supporting encryption are to be used.

Answer: D Explanation:

The concern for preventing data loss is the concern for maintaining data confidentiality. This can be accomplished through encryption, access controls, and steganography.

USB encryption is usually provided by the vendor of the USB device. It is not included on all USB devices.

Question No: 645 – (Topic 4)

Which of the following BEST explains the use of an HSM within the company servers?

Thumb drives present a significant threat which is mitigated by HSM.

Software encryption can perform multiple functions required by HSM.

Data loss by removable media can be prevented with DLP.

Hardware encryption is faster than software encryption.

Answer: D Explanation:

Hardware Security Module (HSM) is a cryptoprocessor that can be used to enhance security. It provides a fast solution for the for large asymmetrical encryption calculations and is much faster than software-based cryptographic solutions.

Question No: 646 – (Topic 4)

The systems administrator wishes to implement a hardware-based encryption method that could also be used to sign code. They can achieve this by:

Utilizing the already present TPM.

Configuring secure application sandboxes.

Enforcing whole disk encryption.

Moving data and applications into the cloud.

Answer: A Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 647 – (Topic 4)

Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system?

Database encryption

USB encryption

Whole disk encryption

TPM

Answer: D Explanation:

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates.

Question No: 648 – (Topic 4)

Which of the following file systems is from Microsoft and was included with their earliest operating systems?

NTFS

UFS

MTFS

FAT

Answer: D Explanation:

File Allocation Table (FAT) is a file system created by Microsoft and used for its earliest DOS operating systems.

Question No: 649 – (Topic 4)

An IT security technician is actively involved in identifying coding issues for her company.

Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?

Vulnerability scanning

Denial of service

Fuzzing

Port scanning

Answer: C Explanation:

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.

Question No: 650 – (Topic 4)

Which of the following data security techniques will allow Matt, an IT security technician, to encrypt a system with speed as its primary consideration?

Hard drive encryption

Infrastructure as a service

Software based encryption

Data loss prevention

Answer: A Explanation:

Disk and device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be accessed in a useable form should the device be stolen. It should be implemented using a hardware-based solution for greater speed.